Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Friday, 12 December 2014

Download Havij Pro 1.17 Pro Free


  • Havij 1.17 Pro Full Download - Exploit SQL Injection Attack Tool!

Havij  is an automated SQL Injection Tool That Helps Penetration Testers To Find and Exploit SQL Injection Vulnerabilities On a Web Page...


Click here To Download :-  Havij 1.17 Pro Free

UnZip Password :- havijpro

It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and  password hashes, dump tables and columns, fetching data from the database, running SQL  statements and even accessing the underlying file system and executing commands on the  operating system.


The power of Havij That Makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij.
The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.

Features
  •     HTTPS support
  •     Add MSSQL Blind
  •     MSAccess more Blind (commercial version only)
  •     PostgreSQL added (only commercial version)
  •     Check for more updates.
  •     User manual query with additional results. (Only the commercial version)
  •     First line on the first request (all in one request), plus (commercial version only)
  •     Dumping the data to a file is added (only commercial version)
  •     Data stored in XML format added (only commercial version)
  •     Inject the target with an increase in port (the default http port is 80) (only commercial version)
  •     XSS bug in saved reports fixed.
  •     Remove log added.
  •     Apply button is added to the set makes it possible to change the settings at any time (only         commercial version)         
  •     Keyword testing and repair methods are added.
  •     Find a sequence of computed columns and optimized for better injection and database to detect.
  •     Find the number of columns and column wires for the better.
  •     “414 Request URI too long” error fixed.
  •     New method to get the table and column in MSSQL further.
  •     An in MSAccess injection when syntax errors are fixed manually defined.
  •     Active XP_Exec add cmdshell (only commercial version)
  •     Active OS_Ex add cmdshell (only commercial version)
  •     Remote desktop-Enable added to cmdshell (only commercial version)
  •     Confusing MySQL, MSSQL 2005, when they found that the number of fixed columns.
  •     Broken MD5-cracker site removed.
  •     Bug in MSSQL error detection is not fixed.
  •     An error in the error column MSSQL is not fixed.
  •     Bug in injecting into access database fixed.
  •     Bug fixed in the data in MSSQL.
  •     Find an error in mssql fixed.
  •     Bug in detecting database type when the number of fixed columns.
  •     Bug in MSSQL error syntactic fixed and executation manually.

UnZip Password :- havijpro

Thursday, 20 November 2014

FBI Offers 1 Million $ Reward for Romanian Cybercriminals


United States investigation Agency Federal Bureau of Investigation (FBI) is looking for the two Romania cyber hackers who is allegedly involve in a massive cyber crimes and cyber frauds. FBI have also announced a monetary awards of $1 million for the information of these two Romania cyber criminals.

The two Romanian nationals, named as Nicolae Popescu and Dumitru Daniel Bosogioiu have made it to the FBI’s Most Wanted Cyber Fugitive List after participating in a long-term cyber-fraud conspiracy that inflicted losses of over $3 million on US businesses.

High level of Online Scamming
According to the FBI, Popescu ran a multimillion dollar cyber-fraud scheme on US-based car-trading websites Cars.com and AutoTrader.com. eBay.com and other similar sites were also used by the fraudsters, who posted advertisements for cars, motorcycles, boats, and other high-value items that had a price range from $10,000 / €8,000 to $45,000 / €36,000.


These criminals have designed there phishing offer so well that it completely looks genuine. Fake invoices that were seemingly issued by legitimate online payment services were sent to the buyers, along with instructions for depositing the money in a US bank account, which belonged to the conspirators.
The US bank accounts receiving the money would be set up by the crooks using fake documents. In this fraud both criminals allegedly made around $3 million in ill gotten moolah.


  • On the statement FBI wrote- 
Popescu coordinated the roles of the various participants in the scheme – he hired and fired passport makers based on the quality of the fake passports they produced, supervised co-conspirators who were responsible for placing the fraudulent ads and corresponding with the victims, and ensured that the illicit proceeds transferred to the U.S. bank accounts were quickly collected and transferred to himself and others acting on his behalf in Europe.

Dumitru Daniel Bosogioiu is also on the list, with a bounty of up to $750,000 / €600,000 for details leading to his arrest. Both of them have been charged along with 11 others. They managed to escape an international takedown in December 2012.


Tuesday, 18 November 2014

Bypass The Uploaders To Upload Shell / Virus!

Today i want to share some techniques which i use to bypass the uploaders to upload shell i hope you will find this article informative.

Hackers always try to find a way inside to exploit and upload their shell to the server or website and for this many times they have to face the restricted uploaders like some uploaders allow only image files like .jpg or .gif etc.

Uploaders actually work in a same way rather they are in php , asp , aspx or any other file format but the technique from which the up loaders detect the shell is same and below are the methods by which uploaders detect the shell.


How They Detect the Shell / virus 


  • By Name 
  • By Source Code


These are two most common way by which uploaders detect your php or asp shell and below we will learn how can we bypass those image or restricted file uploaders.

As i have mentioned the two types of uploaders the one is By name and the second is by Source code now below are the ways by which they detect the uploaders.

1. By Name

  • Disallows the file if it consists .php name 
  • Allow,s the file if it consists .jpg

2. By Source Code
  1. Allows the file if it consists ‰PNG  ( It is Included in every PNG Image file in Starting )
  2. Disallow,s the file if it consists of <?php ( included in every php file in starting ) 

First We will cover the topic No 1

Many Uploaders only detect the php file by its name like if our shell is named shell.php it will read its name and will disallow it but how could we by pass it ? 

  • We can bypass the uploader by creating a combination of upper case and lower case in php file like .PhP or pHP or pHp 

  • we can also bypass it by simply adding .png name in its name before .php because we know that many uploaders read the name of a file and if it contains .png or .jpg in its name they will alow that file to upload example shell.png.php or shell.png.pHp
Advance Method to bypass ( Topic 1) 

One of the most popular advance method used by attackers or hackers is by editing the HTTP Request and sending a customized request to the server and this method works for many peoples.

We will use a Firefox add-on for this purpose so download it by clicking here ( Live HTTP Headers ) 
First Rename the shell file into .jpg like mine is cmd.asp i will rename it into cmd.jpg 
Now we have this uploader and chose your cmd.jpg or the file which you want to upload 



Now after chosing your file , in FireFox click on Tools > Live Http Headers >
And after this Live Http Headers will start up and make sure that capture box is checked and after click on upload to upload your file and Live Http Headers will start capturing the Http packets.


Now Scroll Upside and try to find the name of your file like mine is cmd.asp and after finding that click on it and click on replay and after clicking on it a new window will pop up like below 



Now After clicking on replay you will get the name of your file like cmd.asp and rename it into cmd.jpg.asp and now click on replay and it will resend the http customized request to the server by saying that it is an image file even if named .asp server will allow it because of the http customized request.

And in this way we can also bypass the uploader so our topic one got cleared now lets proceed to the topic to which is Detecting by reading the source code.


  • By Reading the Source Code

we know that some uploaders detect the file by its source like we have a php shell and its named as shell.php and if we open its source we will ind <?php at the starting of the file source and this is what exactly the uploader dose it reads that <?php in the starting and disallows the file

So by adding some source code of picture in the starting of the php file this will allow us to bypass the uploader like below as shown in the picture so click on it to zoom.

Here we have opened one png image file in a notepad and copied the source code from starting of it and pasted it into the php shell file so when we will upload the uploader will scan the %PNG symbol and will allow the file to get upload but keep in mind that there are many uploaders which reads the complete source code and if there,s a <?php any where in the file this will deny the php file So also try to encrypt the php file.


Sunday, 16 November 2014

Making your Own Google Dorks For Hacking-Undestanding Dorks!


  • I Will Tell You Those Google Dorks Which Are Commonly Used By Hackers in Daily Life


Remember one thing that when ever you want to twin two dorks like if you want to join another dork with dork then you will use & symbol...


#1 :- intitle:file upload
This google dork is used to the entered text in website title like if we search " intitle:file upload" then google will search all those websites whose title is file upload as u can see in pic below



#2 :- “intext:File Upload by Encodable“

This google dork used to find Site Vul. File Upload By Encodable if We Search " “intext:File Upload by Encodable“ " then Google Will Search All Those Sites Whose Can Vul. To Upload File By Encodable! In Pic Below

 as We Mentioned in our Last Post That How To Upload File By Encodable :- Upload By Encodable Vul.


 #3:- inurl admin login.asp

This google dork is used to find text every where weather in title or description or in url etc as if we enter inall:admin login this will search every where admin login text in website as in pic below





  1. Now can you twin dorks ?

yes you can twin the dorks by adding & symbol like

inurl:.co.in & inurl:/admin/index.php & intext:user pass

Now what are the advantages of those dorks and why hackers use them ?  many of hackers use them for finding admin panels as for finding admin panel dork is inurl:/admin/index.php & intext:/welcome admin user name pass . now this dork will find admin panels and many hackers use those dorks for finding upload paths to upload their shells like inurl:.co.in & inurl:upload.php & intext:browse . now this dork will find upload paths in indian sites.. i recommend you to learn that because in future tutorials we gona need this..

Monday, 10 November 2014

How To Increase BSNL Broadband Speed



BSNL Internet Speed Hacked!

BSNL Internet is most famous Internet Broadband connection service in India. Its not only due to its ready availability but mainly because of it's somewhat cost-effectiveness. But, even though, many BSNL Broadband and BSNL Cellone Dataone users are frustrated with BSNL Internet speed as they never get speed that BSNL has promised to them and BSNL broadband connection breaks after every minutes because of line errors.  So today i am going to share with you the latest hacks that you can use to increase BSNL broadband connection speed and avoid regular disconnection and line losses

How To Speed Up BSNL Internet Speed [ Hacked ]

1- Change BSNL DNS Servers :-

The main reason for slow BSNL Broadband connection speed is slow BSNL DNS servers. So, we can increase BSNL Broadband connection speed by changing default BSNL DNS servers to fast BSNL DNS servers, which can help us to increase BSNL broadband connection speed. Using public DNS servers improves speed, as BSNL has lot of users and all using the same DNS servers. So during peak time the DNS reacts very slow and takes a lot of time to translate the host address to numerical value, called IP address that your network used to connect to website.
Use these DNS servers for best speed




2. Use Adblock Plus:

The best way to increase BSNL Broadband connection speed is to block flash and other unwanted ad material on webpage, so that page loads faster, thus make BSNL Broadband apparently fast. AdBlockPlus is a firefox addon used to block flash content of page, thus helping you to increase BSNL Broadband connection speed. This has a lot of effect as it blocks unwanted advertisements and popups thus making your internet browsing experience even better.


3. Using TCPOptimizer:

This is another software used to optimize your TCP/IP connection settings. TCP/IP determines the maximum transfer Unit(MTU) for your device. The maximum data that your connection can send or receive per packet. Best MTU setting for BSNL broadband is 1492 ( by default its 1500 that causes an extra load on your broadband connection that why disconnections occur as you are forcing your device for doing something that it is not capable off, so optimise your TCP/IP settings). You can use TCP Optimizer your BSNL network settings. Install TCPOptimizer.


4. Reducing cache space:


Reduced Cache space can be used to increase BSNL Broadband speed. You can do this as:
For Internet Explorer : Tools - Internet Options - Browsing History - Settings - Disk space to use and reduce disk space value to "50".
For Firefox: Tools - Options - Advanced - Network and look for cache space. Change value to 50.



Wednesday, 5 November 2014

Top 5 Famous Blackhat Hackers and What Happened to Them!

In this article, I’ll be talking specifically about famous hackers that don hats of black. Here are five of the most widely known black hatters and what happened to them for their recklessness.

Jonathan James 

Jonathan James was known as “comrade” on the Internet. What is his ticket to fame? He was convicted and sent to prison for hacking in the United States–all while he was still a minor. At only fifteen years of age, he managed to hack into a number of networks, including those belonging to Bell South, Miami-Dade, the U.S. Department of Defense, and NASA.

Yes, James hacked into NASA’s network and downloaded enough source code to learn how the International Space Station worked. The total value of the downloaded assets equaled $1.7 million. To add insult to injury, NASA had to shut down their network for three whole weeks while they investigated the breach, which cost them $41,000.


The story of James has a tragic ending, however. In 2007, a number of high profile companies fell victim to a massive wave of malicious network attacks. Even though James denied any involvement, he was suspected and investigated. In 2008, James committed suicide, believing he would be convicted of crimes that he did not commit.

Kevin Mitnick

Kevin Mitnick’s journey as a computer hacker has been so interesting and compelling that the U.S. Department of Justice called him the “most wanted computer criminal in U.S. history.” His story is so wild that it was the basis for two featured films.

What did he do? After serving a year in prison for hacking into the Digital Equipment Corporation’s network, he was let out for 3 years of supervised release. Near the end of that period, however, he fled and went on a 2.5-year hacking spree that involved breaching the national defense warning system and stealing corporate secrets.

Mitnick was eventually caught and convicted, ending with a 5-year prison sentence. After serving those years fully, he became a consultant and public speaker for computer security. He now runs Mitnick Security Consulting, LLC.

Albert Gonzalez

Albert Gonzalez paved his way to Internet fame when he collected over 170 million credit card and ATM card numbers over a period of 2 years. Yep. That’s equal to a little over half the population of the United States.

Gonzalez started off as the leader of a hacker group known as ShadowCrew. This group would go on to steal 1.5 million credit card numbers and sell them online for profit. ShadowCrew also fabricated fraudulent passports, health insurance cards, and birth certificates for identity theft crimes totaling $4.3 million stolen.

The big bucks wouldn’t come until later, when Gonzalez hacked into the databases of TJX Companies and Heartland Payment Systems for their stored credit card numbers. In 2010, Gonzalez was sentenced to prison for 20 years (2 sentences of 20 years to be served out simultaneously).

Kevin Poulsen

Kevin Poulsen, also known as “Dark Dante,” gained his fifteen minutes of fame by utilizing his intricate knowledge of telephone systems. At one point, he hacked a radio station’s phone lines and fixed himself as the winning caller, earning him a brand new Porsche. According to media, he was called the “Hannibal Lecter of computer crime.”

He then earned his way onto the FBI’s wanted list when he hacked into federal systems and stole wiretap information. Funny enough, he was later captured in a supermarket and sentenced to 51 months in prison, as well paying $56,000 in restitution.

Like Kevin Mitnick, Poulsen changed his ways after being released from prison. He began working as a journalist and is now a senior editor for Wired News. At one point, he even helped law enforcement to identify 744 sex offenders on MySpace.

Gary McKinnon

Gary McKinnon was known by his Internet handle, “Solo.” Using that name, he coordinated what would become the largest military computer hack of all time. The allegations are that he, over a 13-month period from February 2001 to March 2002, illegally gained access to 97 computers belonging to the U.S. Armed Forces and NASA.

McKinnon claimed that he was only searching for information related to free energy suppression and UFO activity cover-ups. But according to U.S. authorities, he deleted a number of critical files, rendering over 300 computers inoperable and resulting in over $700,000 in damages.

Being of Scottish descent and operating out of the United Kingdom, McKinnon was able to dodge the American government for a time. As of today, he continues to fight against extradition to the United States.




Tuesday, 4 November 2014

Web Hacking For Beginners

How to bypass Admin Login Page of website using SQLi: [[ SQL Injection ]]


Hello Readers! We're Back Again With Web Hacking For Beginners!

NEW UPDATE!


Many People asked us for hacking but it is impossible to be LEET with in Minutes or Hours :) . We should start from Basic. In this circumtacne i am writing This article.With the help of ScreenShots i will try to make you understand. So, lets Start :)

Step By Step! =D

First Copy / Download File From Here :- Download SQLi txt File

Friends after downloading This SQLi txt File your next step is to find site's admin panel. For this u can use havij or any other online admin panel finder. I am giving you some google dorks u can also use these:

I am sharing some of common google DORKS for beginning afterwords u can use yours own...
Here are the DORKS

  • Dorks

inurl:adminlogin.aspx
inurl:admin/index.php
inurl:administrator.php
inurl:administrator.asp
inurl:login.asp
inurl:login.aspx
inurl:login.php
inurl:admin/index.php
inurl:adminlogin.aspx 

Now, I copy the dork and paste in google...See below in Pic




Now i got many sites by google search.. Pick anyone of them as i am picking from here:


We are going to our aim perfectly...Now from SQLi txt File copy and paste one of them in username and password box. (same string add at a time)


 Now Just Press enter key and u done it......See pic below


yey!.....admin panel bypassed...Now u can hack the site easily.....

If any porblem or u like this articleyou can feedback in comments :)

Subscribe us For More =)

Education Purpose Only





Monday, 3 November 2014

How to Deface website Via Encodable Shell File Upload!

After posting Last article friends were asking me for more new and easy methods for web hacking so i am posting a new article. Very few of them know this method. For thos who knows this method sorry for them and those who dont know will like this post , I hope... :)

Encodable Shell File upload is also a vulnerability in which we can upload our DEFACE PAGES or SHELLS…


STEPS:

1) Goto google and type in the following dork:


“intext:File Upload by Encodable“


2)  Many results will be there but some of them will be Thier ! So you just want to open of which ‘s title is “Upload File” or something like that!


You can Use Any Site !

3) Now select your Deface page by clicking Browse button..


In e-mail Tab Use any Fake E-mail Like = abc@gmail.com

4) Press begin upload.. It will be uploading and take for a min


5) Your deface name will be shown, Click on that


5) Your deface is uploaded...Thatss itt ... :)


Hope you like it!

URL :- http://huntereditions.com/upload/Hackedlol/GHacked.html

Thank You!



Sunday, 2 November 2014

3 Basic Tips To Prevent A DDoS Attack


Distributed denial-of-service (DDoS) attacks are always in top headlines worldwide, as they are plaguing websites in banks, and virtually of almost every organization having a prominent online presence. The main cause behind the proliferation of DDoS attacks is that there is a very low-cost that the attacker has to incur to put such attack in motion. Fortunately, today various prevention methods have been developed to tackle such attacks. Before delving further into understanding about the ways to prevent DDoS attack, let’s first understand what exactly a DDoS attack is!

Understanding DDOS Attack



A DDoS (distributed denial-of-service) attack is an attempt made by attackers to make computers’ resources inaccessible to its anticipated user. In order to carry out a DDOS attack the attackers never uses their own system; rather they create a network of zombie computers often called as a “Botnet” – that is a hive of computers, to incapacitate a website or a web server.

Let’s understand the basic idea! Now, the attacker notifies all the computers present on the botnet to keep in touch with a particular site or a web server, time and again. This increases traffic on the network that causes in slowing down the speed of a site for the intended users. Unfortunately, at times the traffic can be really high that could even lead to shutting a site completely.

3 Basic Tips to Prevent a DDoS Attack


There are several ways to prevent the DDOS attack; however, here in this guest post I’ll be covering three basic tips that will help you to protect your website from the DDoS attack.

1. Buy More Bandwidth.


One of the easiest methods is to ensure that you have sufficient bandwidth on your web. You’ll be able to tackle lots of low-scale DDOS attacks simply by buying more bandwidth so as to service the requests. How does it help? Well, distributed denial of service is a nothing more than a game of capacity. Let’s suppose you have 10,000 computer systems each distributing 1 Mbps directed towards your way. This means you’re getting 10 GB of data that is hitting your web server every second. Now, that’s causes a lot of traffic!

So to avoid such issue, you need to apply the same rule intended for normal redundancy. According to this technique, if you wish to have more web servers just multiply around diverse datacenters and next make use of load balancing. By spreading your traffic to various servers will help you balance the load and will most likely create large space adequate to handle the incessant increase in traffic.
However, there’s a problem with this method that is buying more bandwidth can be a costly affair. And as you’ll know that the current DDoS attacks are getting large, and can be a lot bigger exceeding your budget limit.

2. Opt for DDoS Mitigation Services.

A lot of network or Internet-service providers render DDoS mitigation capabilities. Look for an internet service provider having the largest DDoS protection and mitigation network, automated tools, and a pool of talented anti-DDoS technicians with the wherewithal to take action in real-time as per the varying DDoS attack characteristics. A viable alternative is to utilize a DDoS prevention appliance, which is specifically intended to discover and prevent distributed denial-of-service attacks.

3. Restricted Connectivity.


In case you have computer systems that are connected to the web directly, a better idea is to properly install/configure your routers and firewall so as to limit the connectivity. For an instance, while receiving some data from a client machine you can only allow traffic to pass from the machine only on a few chosen ports (like HTTP, POP, SMTP etc.) via the firewall.

Wrapping Up!


Websites are largely getting attacked by hackers every second. Denial-of-service attack is insanely getting huge and is creating a lot of problems for business organizations having strong online vicinity. In this guest post you’ll not only understand what a DDoS attack actually means, but will also come to know about a few type of methods to prevent DDoS attacks. Aforementioned are three tips that I’ll recommend you to run through to at least understand where to get started towards building a resilient web network with chances of surviving a DDoS attack.


Sunday, 26 October 2014

How To Hack Website!

Hello

I am going to tell you a method for hacking Websites.
So i will to explain in such a way so that noobs can also understand this.
I will Suggest you to try to practice hacking manually not by tools Because tools will not make your skills to go high. But if you are a lazy guyz then use tools :D


First Download WebCruiser Scanner

Download Link:


Then You will need a target that you want to hack, which  you can use Google dorks to find vulnerable websites,

I will not share google dorks with you as there are thousands of Google dorks
 which you can find from google

  I found my vulnerable website:

Code:

http://www.YourTARGETsite.com/vmarket.php?id=17

Let's open WebCruiser Scanner and check if the target is Vulnerable or not?


Then Scan the Site:


Then Waite for some time so that the scanner can give you the result:


As we can see the website is vulnerable to Sql injection & XSS.
Now We will perform a SQL injection .
[#] AttackRight click on the vulnerable url and then SQL INJECTION POC , now you
just follow my steps below. 


Then:


Then:


Then:


Then:


Then:


that's all done!



*ATTENTION* – FOLLOWING ARTICLE IS FOR EDUCATIONAL PURPOSES ONLY.

Wednesday, 22 October 2014

Get a free .Tk Domain

This article will help you to get a free .tk domain. The .tk domain is provided by a company (.tk is a geographical level domain). Here, you can also get it freely. This trick help you to make a redirection url like yourwebsite.tk. This trick helps you to get rid of those .blogspot.com,.something.com domains. Once you get a .tk domain and when one access that url,he/she will be taken to the website you have assigned for redirection. Or in short when you go to something.tk(example), you will be taken to your website. Or .tk can help you and your users to access your website(as I said above those .blogspot.com etc) through an alternate way. So just follow these steps and share your free .tk domain and let visitors visit your blog or any subdomain blogs.
Go to - Click Here (DotTk)


Search for the availability of the required domain name


If its available you will be taken to a page like this
(the given below name is only for demonstration purpose)



In the option ‘forward this domain to’ under ‘use your new domain’(first option ,see above image), give the url of your .blogspot or any other long url(most probably your websites url). You can also assign a DNS for your domain.
(This step is inevitable other wise there is no use with your domain). For example consider that my blog address is myblogslongurl.subdomain.com (ex:blogspot.blogspot.com). While registering for a .tk domain I will give this url for forwarding (step 4,let the registered domain name be bloggee.tk) . Once created, when someone goes to blogee.tk, they will be taken to bloogspot.blogspot.com. so they don’t need to type full URL





Then you will get a confirmation mail. Click on that link and type the code you got in the mail(recommended to activate your account) 




 Once done you can login to your account to use their apps and other functionalities


How To Secure Your Facebook Account

99% Facebook Account Hack Through Email Account


Hello Besthacking Readers Today i will tell you how to secure your Facebook Account.

If you make your Facebook account with Gmail Account then secure your gmail account in my previous post check how to secure your gmail account.. if your Gmail account secure it means your facebook account 70% already secured.. In this post i will show you in pics How to secure your Facebook account...

1st step:-

Go to Security setting



Then Change your login notifications setting




Now Set Your Privacy Settings



Do not show Your Email Address to Anyone ....

Do not Use Your Password In common Words..

Like LoveYou-Jaimatadi-Bf Name-Gf Name....

Use Password Like

my143@my143_my143 

Love@143_love@143

Vry Strong Passwords Like

MY_143@#&MY(M)
MY@143(143)MY_143 

Command Prompt Tricks, Hacks & Codes


Command Prompt is one of the most powerful tools in Windows; but sadly, it is also the most ignored one. Things were not always like this; but with the advent of GUI based operating systems, people started feeling that computing through command based tools was boring. This ultimately lead the command prompt into obscurity. 

However, the command prompt is not useless. In fact, it can be pretty useful. This article provides some excellent tricks, secrets and hacks that will make you realize that the Windows Command Prompt is not only useful but also a tool that you should definitely give more respect to.


1-Watch ASCII version of the Star Wars Episode IV movie
Surprised yet? You can watch an ASCII version of the full Star Wars Episode IV Movie right in your command prompt window. Just open command prompt, type a small code and the movie will start playing immediately. Read the complete instructions here. 

2- Create Matrix falling code effect
Have you watched “The Matrix”? Of course, you have. Then, you already know what I am talking about. In case you still don't know what I mean, take a look at this image! You can create the same effect in command prompt using just a few lines of code. Head over to this post for instructions.



3- Make Folders that you cannot delete

Are you tired of accidentally deleting important folders? Well, if you are, you can learn how to make undeletable folders here.

4- Shutdown your computer giving a funny reason

What if your computer shuts down saying that it is tired and doesn't want to work anymore? It would be fun, wouldn't it? You can do so by reading the instructions here.

5- Know your IP address, DNS Server's address and a lot more about your Internet Connection

Command Prompt can even let you know your IP address. Just type ipconfig/ all in the command prompt and press Enter. Along with your IP address and DNS servers, command prompt will also return a ton of information like your host name, primary DNS suffix, node type, whether IP Routing ,Wins Proxy, and DHCP are enabled, your network adapter's description, your physical (MAC) address etc . 




6- Know if your neighbours are stealing your WiFi connection

command prompt codesCommand Prompt can let you know if someone is connected to your Local Area Connection and using it. Just follow the steps:- 
1) Open your browser and visit http://192.168.1.1 or http://192.168.0.1 depending on your router. 
2) Find the tab that mentions “Attached Devices” or something similar.
3) Find the computer name, IP address and MAC Address (sometimes called Physical Address or Hardware Address) of your computer using the previous trick.
4 )Compare it with those displayed by your router in Step 2. If you notice some strange devices, then your neighbour has been sneaking in on your internet connection and it is best to add a password.

7- Know if someone is hacking your computer/ Trace a Hacker

Command Prompt hacksWant to know if someone is hacking your computer? Command Prompt can help you find if someone you don't know is connected to your computer stealing private data. Just execute netstat -a and the command prompt will return a list of computers that your computer is connected to. In the results returned, Proto column gives the type of data transmission taking place (TCP or UDP) , Local address column gives the port with which your computer is connected to an external computer and the Foreign Address column gives the external computer you are connected to along with the port being used for the connection. State gives the state of the connection (whether a connection is actually established, or waiting for transmission or is “Timed Out”).